Robust face representation is imperative to highly accurate face recognition. In this work, we propose an open source face recognition method with deep representation named as VIPLFaceNet, which is a lO-layer deep con...
详细信息
Robust face representation is imperative to highly accurate face recognition. In this work, we propose an open source face recognition method with deep representation named as VIPLFaceNet, which is a lO-layer deep convolu- tional neural network with seven convolutional layers and three fully-connected layers. Compared with the well-known AlexNet, our VIPLFaceNet takes only 20% training time and 60% testing time, but achieves 40% drop in error rate on the real-world face recognition benchmark LFW. Our VIPLFaceNet achieves 98.60% mean accuracy on LFW us- ing one single network. An open-source C++ SDK based on VIPLFaceNet is released under BSD license. The SDK takes about 150ms to process one face image in a single thread on an i7 desktop CPU. VIPLFaceNet provides a state-of-the-art start point for both academic and industrial face recognition applications.
Word-embedding acts as one of the backbones of modern natural language processing(NLP).Recently,with the need for deploying NLP models to low-resource devices,there has been a surge of interest to compress word embedd...
详细信息
Word-embedding acts as one of the backbones of modern natural language processing(NLP).Recently,with the need for deploying NLP models to low-resource devices,there has been a surge of interest to compress word embeddings into hash codes or binary vectors so as to save the storage and memory ***,existing work learns to encode an embedding into a compressed representation from which the original embedding can be *** these methods aim to preserve most information of every individual word,they often fail to retain the relation between words,thus can yield large loss on certain *** this end,this paper presents Relation Reconstructive Binarization(R2B)to transform word embeddings into binary codes that can preserve the relation between *** its heart,R2B trains an auto-encoder to generate binary codes that allow reconstructing the wordby-word relations in the original embedding *** showed that our method achieved significant improvements over previous methods on a number of tasks along with a space-saving of up to 98.4%.Specifically,our method reached even better results on word similarity evaluation than the uncompressed pre-trained embeddings,and was significantly better than previous compression methods that do not consider word relations.
Most existing researches on relation extraction focus on binary flat relations like Bomln relation between a Person and a *** a large portion of objective facts de-scribed in natural language are complex,especially in...
详细信息
Most existing researches on relation extraction focus on binary flat relations like Bomln relation between a Person and a *** a large portion of objective facts de-scribed in natural language are complex,especially in professional documents in fields such as finance and biomedicine that require precise *** example,“the GDP of the United States in 2018 grew 2.9%compared with 2017”describes a growth rate relation between two other relations about the economic index,which is beyond the expressive power of binary flat ***,we propose the nested relation extraction problem and formulate it as a directed acyclic graph(DAG)structure extraction ***,we propose a solution using the Iterative Neural Network which extracts relations layer by *** proposed solution achieves 78.98 and 97.89 FI scores on two nested relation extraction tasks,namely semantic cause-and-efFect relation extraction and formula ***,we observe that nested relations are usually expressed in long sentences where entities are mentioned repetitively,which makes the annotation difficult and ***,we extend our model to incorporate a mention-insensitive mode that only requires annotations of relations on entity concepts(instead of exact mentions)while preserving most of its *** mention-insensitive model performs better than the mention sensitive model when the random level in mention selection is higher than 0.3.
Low-rank tensor factorization(LRTF) provides a useful mathematical tool to reveal and analyze multi-factor structures underlying data in a wide range of practical applications. One challenging issue in LRTF is how to ...
详细信息
Low-rank tensor factorization(LRTF) provides a useful mathematical tool to reveal and analyze multi-factor structures underlying data in a wide range of practical applications. One challenging issue in LRTF is how to recover a low-rank higher-order representation of the given high dimensional data in the presence of outliers and missing entries, i.e., the so-called robust LRTF problem. The L1-norm LRTF is a popular strategy for robust LRTF due to its intrinsic robustness to heavy-tailed noises and outliers. However, few L1-norm LRTF algorithms have been developed due to its non-convexity and non-smoothness, as well as the high order structure of data. In this paper we propose a novel cyclic weighted median(CWM) method to solve the L1-norm LRTF problem. The main idea is to recursively optimize each coordinate involved in the L1-norm LRTF problem with all the others fixed. Each of these single-scalar-parameter sub-problems is convex and can be easily solved by weighted median filter, and thus an effective algorithm can be readily constructed to tackle the original complex problem. Our extensive experiments on synthetic data and real face data demonstrate that the proposed method performs more robust than previous methods in the presence of outliers and/or missing entries.
In this paper,an iterative regularized super resolution (SR) algorithm considering non-Gaussian noise is *** on the assumption of a generalized Gaussian distribution for the contaminating noise,an lp norm is adopted t...
详细信息
In this paper,an iterative regularized super resolution (SR) algorithm considering non-Gaussian noise is *** on the assumption of a generalized Gaussian distribution for the contaminating noise,an lp norm is adopted to measure the data fidelity term in the cost *** the meantime,a regularization functional defined in terms of the desired high resolution (HR) image is employed,which allows for the simultaneous determination of its value and the partly reconstructed image at each iteration *** convergence is thoroughly *** results show the effectiveness of the proposed algorithm as well as its superiority to conventional SR methods.
In this paper, we propose a method to improve localization algorithm of maximum likelihood estimation;the localization scheme relies on the distance threshold. In order to suppress effectively the effects of received ...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
In this paper, we propose a method to improve localization algorithm of maximum likelihood estimation;the localization scheme relies on the distance threshold. In order to suppress effectively the effects of received signal strength error to node localization precision. This paper presents an indoor localization algorithm based on received signal strength to select anchor nodes. Compared with the traditional localization algorithm, this scenario not only improve the localization accuracy, but also reduce the calculation complexity of nodes. The simulation results show that the average error of the proposed method is less than 0.15 m. Moreover, when there are a large number of anchor nodes, the computational complexity is effectively reduced. Verification result verifies the effectiveness and reliability of the algorithm.
The traditional double-threshold endpoint detection method has the phenomenon of missing detection. Therefore, the speech recognition(SR) system based on vector quantization(VQ) in this paper proposes an improved algo...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
The traditional double-threshold endpoint detection method has the phenomenon of missing detection. Therefore, the speech recognition(SR) system based on vector quantization(VQ) in this paper proposes an improved algorithm for this phenomenon, which effectively avoids the problem of missing detection. Then, Mel Frequency Cepstral Coefficients(MFCC) is used to extract the characteristic parameters of the speech signal, and the multistage vector quantization is used to quantify the characteristic parameters. Experimental results show that, the proposed algorithm improves the recognition rate of the text-independent speaker recognition system by 8.7%, and it also confirms that the longer the training speech is, the higher the recognition rate will be.
In recent years, semantic search has become one hot motivation of the semantic web. In this paper, we propose a semantic-based resource management and search architecture and its implementation in research community, ...
Data space is a semi-structural data model for the management of large-scale heterogeneous data objects. In a data space, each data object consists of a set of attribute-value pairs to describe the internal properties...
详细信息
In the cyber-physical society, networks are constructed for information transportation. Among them, power law networks with the scale free property are extensively found in self-organized systems. The dynamicity of th...
详细信息
暂无评论